2014 23rd International Conference on Computer Communication and Networks (ICCCN)最新文献

筛选
英文 中文
Tualatin: Towards network security service provision in cloud datacenters 面向云数据中心的网络安全服务提供
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911782
Xiang Wang, Zhi Liu, Jun Li, Baohua Yang, Yaxuan Qi
{"title":"Tualatin: Towards network security service provision in cloud datacenters","authors":"Xiang Wang, Zhi Liu, Jun Li, Baohua Yang, Yaxuan Qi","doi":"10.1109/ICCCN.2014.6911782","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911782","url":null,"abstract":"Multi-tenant infrastructures deployed in cloud datacenters need network security protection. However, the rigid control mechanism of current security middleboxes induces inflexible orchestration, limiting the agile and on-demand security provision in virtualized datacenters. This paper presents Tualatin, a consolidated framework of delivering security services in multi-tenant datacenters. It meets security requirements of different scenarios by hardware and software co-design. Leveraging Software-Defined Networking (SDN) and OpenFlow techniques, Tualatin provides fine-grained security protection in dynamically changing network topologies, where both switches and security middleboxes are programmatically controlled by logically centralized controllers. With service-level APIs exposed, Tualatin could be easily integrated with other Cloud Management System (CMS). A proof-of-concept system has been deployed in a Tier-IV datacenter, providing customizable network security services for tenant Virtual Private Cloud (VPC) infrastructure.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hybrid opportunistic routing in highly dynamic MANET 高动态MANET中的混合机会路由
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911863
C. Aung, P. Chong, R. Cai
{"title":"Hybrid opportunistic routing in highly dynamic MANET","authors":"C. Aung, P. Chong, R. Cai","doi":"10.1109/ICCCN.2014.6911863","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911863","url":null,"abstract":"In this paper, we propose a new routing protocol called hybrid opportunistic routing (HOR) which takes the advantage of broadcast nature of wireless medium and replication-based data forwarding. The data packets are transmitted by broadcast-based forwarding if the destination node is within two-hop distance from sender or by replication-based forwarding otherwise. By exploiting overhearing opportunity, nodes can build up knowledge about data packets. The adaptive nature of data forwarding and overhearing capability provide high data delivery with minimum buffer requirement in highly dynamic MANET. Simulation results prove that 1) proposed scheme increases data delivery by above 30% compared to traditional MANET routing and 2) it can achieve 98% data delivery with 17% of the total packets for buffer space compared to replication-based routing which requires 50% of the total packets for buffer space to maintain 89% of data delivery.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123466973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
LOCON: A lookup-based content-oriented networking framework LOCON:基于查找的面向内容的网络框架
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911755
Eunsang Cho, Jaeyoung Choi, Dong-Hyoun Kim, J. Yoon, T. Kwon, Yanghee Choi
{"title":"LOCON: A lookup-based content-oriented networking framework","authors":"Eunsang Cho, Jaeyoung Choi, Dong-Hyoun Kim, J. Yoon, T. Kwon, Yanghee Choi","doi":"10.1109/ICCCN.2014.6911755","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911755","url":null,"abstract":"While the current Internet has a host-based TCP/IP architecture, the vast majority of Internet usage is attributed to the content retrieval and distribution. This mismatch has proliferated content delivery network (CDN) technologies and P2P file-sharing systems (e.g., BitTorrent); however, the inefficiency of content delivery is not fundamentally solved, and there are business/operation and content copyright/availability issues, respectively. Also, in the research community, there have been efforts to redesign the current architecture from a content-centric perspective by introducing the route-by-name paradigm and in-network caching, which however entails many issues like the routing scalability and processing overhead. We propose a lookup-based communication framework for content-oriented networking (LOCON), whose main components are locator lookup, coordinated caching, and parallel transmissions. LOCON aims to accommodate incremental deployment, support legacy end-hosts, and provide business incentives between network operators and content publishers. To carry out the experiments, we build a networking testbed on top of Amazon data centers around the world. LOCON performs better than other lookup-by-name networking technologies and CCN (i.e., a route-by-name scheme) in terms of content delivery metrics.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125879805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JCCA resource allocation for video transmission in OFDMA relay system OFDMA中继系统中视频传输JCCA资源分配
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911834
Yimin Zhang, Guizhong Liu
{"title":"JCCA resource allocation for video transmission in OFDMA relay system","authors":"Yimin Zhang, Guizhong Liu","doi":"10.1109/ICCCN.2014.6911834","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911834","url":null,"abstract":"In this paper, we propose a joint content and channel aware (JCCA) resource allocation algorithm for video transmission in OFDMA relay system. It can maximize accumulation of allocated subcarriers' contribution for video transmission so as to improve overall quality of users' received video under resource constrained conditions. As is explained in this work, the algorithm is implemented by packet scheduling, path selection and subcarrier allocation, in which time-varying data content and channel state are jointly considered at the same time. In the simulation results, we make comparison between the JCCA resource allocation algorithm and others for video transmission in OFDMA relay system. It is demonstrated that the proposed algorithm can perform better in improving overall quality of users' received video.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"0 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129763829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rate-adaptive broadcast routing and scheduling for video streaming in wireless mesh networks 无线网状网络中视频流的速率自适应广播路由和调度
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911816
Yanan Chang, X. Jia
{"title":"Rate-adaptive broadcast routing and scheduling for video streaming in wireless mesh networks","authors":"Yanan Chang, X. Jia","doi":"10.1109/ICCCN.2014.6911816","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911816","url":null,"abstract":"In this paper, we address the problem of broadcast routing and scheduling of video streaming for delay-sensitive applications in backbone WMNs. Given a source node and a set of destinations, our task is to build a broadcast routing tree and compute an optimal transmission schedule such that the network throughput for the source to broadcast streaming data to all the destinations is maximized. The problem is challenged by both rate-adaptive broadcast and inter/intra-flow interference caused by video streaming. We divide the whole period for video broadcast into identical time frames and prove that maximizing the total throughput can be converted into minimizing the length of a time frame. We formulate the minimization problem as a mixed integer quadratically constrained program and propose a three-step method as a solution. Firstly, we build the broadcast routing tree by defining a new routing metric to select the relay nodes. Then we use local search to adjust the tree structure. Last, we propose a greedy method to make scheduling of concurrent transmissions without causing inter/intra-flow interference. Extensive simulations have demonstrated that our proposed method can improve the performance significantly compared with existing routing and scheduling methods.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129558909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Achieving data K-Availability in intermittently connected sensor networks 在间歇连接传感器网络中实现数据k -可用性
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911795
Bin Tang, Neeraj Jaggi, M. Takahashi
{"title":"Achieving data K-Availability in intermittently connected sensor networks","authors":"Bin Tang, Neeraj Jaggi, M. Takahashi","doi":"10.1109/ICCCN.2014.6911795","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911795","url":null,"abstract":"We consider the problem of preserving data in intermittently connected sensor networks wherein sensor nodes do not always have connected paths to the base stations. The generated data is first stored inside the network before being uploaded to the base station when uploading opportunities arise. Each node has both limited energy level and limited storage space, and is associated with a probability of failure. To guarantee that at any moment, each generated data item is available for being uploaded in the presence of node failure, we propose to replicate K copies of each data item in the network, where K depends upon the node failure probability. We refer to the problem as Data K-Availability Problem (DKAP). DKAP is naturally divided into two phases: K-Availability creation and K-Availability maintenance. For K-Availability creation, we show that the problem is NP-hard for arbitrary data sizes, and that it is equivalent to minimum cost flow problem for unit data sizes. For K-Availability maintenance, we show that it is NP-hard even for unit data sizes and design a centralized greedy heuristic. We further design an efficient and low-overhead distributed algorithm, which is applicable to both phases, and show using extensive simulations that it performs close to the heuristic.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130697248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Transient magnetic field formulation for solid source conductors with axial symmetry 轴对称固体源导体瞬态磁场公式
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911836
G. Wimmer
{"title":"Transient magnetic field formulation for solid source conductors with axial symmetry","authors":"G. Wimmer","doi":"10.1109/ICCCN.2014.6911836","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911836","url":null,"abstract":"The simulation of transient magnetic field problems requires the repeated and successive solution of high-dimensional linear systems with near-identical system matrices and different righthand side vectors. The combination of conjugate gradient method with subspace projection methods is shown. Additionally, the formulation for the azimuthal component of the magnetic vector potential for axisymmetric magnetostatic applications reveal a singularity which is the source of numerical instability. A variable transformation is introduced to remove the singularity from the numerical scheme and to move it to the postprocessing.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132975542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key technologies for SON in next generation radio access networks 下一代无线接入网络中SON的关键技术
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911745
Xin Su, Jie Zeng, Chiyang Xiao
{"title":"Key technologies for SON in next generation radio access networks","authors":"Xin Su, Jie Zeng, Chiyang Xiao","doi":"10.1109/ICCCN.2014.6911745","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911745","url":null,"abstract":"The aim of SON (Self-Organizing Network) is to realize the autonomic function of the wireless network by self-configuration, self-optimization and self-healing, which reduces the human intervention and improves the user experience. Self-configuration is a process where newly deployed eNodeB are configured by automatic installation procedures to get the necessary basic configuration for system operation. Self-optimization is a process that continuously monitors an environment and automatically optimizes various parameters when the environment changes. Self-healing is a process that detects and localizes failures, then fixes the problems automatically. This paper gives a comprehensive introduction to the SON functionalities and outlines the framework of self-configuration, self-optimization and self-healing. Some concrete algorithms are proposed for self-optimization and self-healing, which include capacity and coverage optimization and cell outage detection and compensation respectively. Simulation results in various scenarios are provided to evaluate the performance of the proposed algorithms.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129172969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dandelion: A locally-high-performance and globally-high-scalability hierarchical data center network 蒲公英:一个本地高性能和全球高可伸缩性的分层数据中心网络
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911750
Binzhang Fu, Sheng Xu, Wentao Bao, Guolong Jiang, Mingyu Chen, Lixin Zhang, Yidong Tao, Rui He, Junfeng Zhao
{"title":"Dandelion: A locally-high-performance and globally-high-scalability hierarchical data center network","authors":"Binzhang Fu, Sheng Xu, Wentao Bao, Guolong Jiang, Mingyu Chen, Lixin Zhang, Yidong Tao, Rui He, Junfeng Zhao","doi":"10.1109/ICCCN.2014.6911750","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911750","url":null,"abstract":"The increasing customer demand is driving modern data centers to embrace the freely-expandable network architecture. Unfortunately, state-of-the-art freely-expandable networks suffer from either the large granularity of expansion or the prohibitive implementation cost. Furthermore, a recent research showed that data center traffic tends to be highly clustered. Based on above observations, this paper proposes a freely-expandable network architecture, namely the dandelion. Dandelion is a two-level hierarchical network, where the first level aims at “high performance” and the second level aims at “high scalability”. The resulting network has two distinct advantages. First, it could arbitrarily expand with a reasonable granularity. Second, the router architecture is efficient as well as highly scalable since 1) the routing table is significantly compressed and 2) a fixed number of virtual channels per physical channel are required regardless of the network size. Finally, the traffic characteristics of four typical cloud applications are analyzed, and the generated traffic patterns are used to evaluate the proposed network architecture. Simulation results prove that the dandelion is a promising network architecture for future data centers.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An IEEE 802.11 quantum handshake using the three-stage protocol 使用三阶段协议的IEEE 802.11量子握手
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911849
Mayssaa El Rifai, P. Verma
{"title":"An IEEE 802.11 quantum handshake using the three-stage protocol","authors":"Mayssaa El Rifai, P. Verma","doi":"10.1109/ICCCN.2014.6911849","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911849","url":null,"abstract":"This paper presents a model of integration of the Three-stage quantum cryptography protocol and its variants into the IEEE 802.11 wireless communication standard. The three-stage protocol is introduced during the quantum handshake as a replacement to the BB'84 protocol. Compared to the quantum handshake using BB'84, integrating the three-stage protocol offers several benefits such as enhanced data rates, fewer steps needed to establish the final key, longer distances, and increased number of photons that can be used during the transmission process. In addition, this paper presents a multi-agent software approach to implement the quantum handshake using the three-stage protocol.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127570878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信